We actively support the following versions of KhazarLLMs:
| Version | Supported |
|---|---|
| 0.1.x | ✅ |
| < 0.1 | ❌ |
We take security vulnerabilities seriously. If you discover a security issue, please report it responsibly.
DO NOT create a public GitHub issue for security vulnerabilities.
Instead, please report security vulnerabilities through one of the following methods:
-
GitHub Security Advisories (Preferred)
- Go to https://github.com/NickScherbakov/KhazarLLMs/security/advisories
- Click "Report a vulnerability"
- Fill in the details
-
Email
- Send an email to: nick@example.com
- Use subject line: "[SECURITY] KhazarLLMs Vulnerability Report"
Please include the following information in your report:
- Description of the vulnerability
- Steps to reproduce the issue
- Potential impact of the vulnerability
- Affected versions (if known)
- Suggested fix (if you have one)
- Your contact information for follow-up
- Initial Response: Within 48 hours
- Status Update: Within 7 days
- Fix Timeline: Depends on severity
- Critical: Within 7 days
- High: Within 14 days
- Medium: Within 30 days
- Low: Next regular release
When using KhazarLLMs:
-
API Keys
- Never commit API keys to version control
- Use environment variables or
.envfiles - Keep
.envfiles out of version control (in.gitignore) - Rotate API keys regularly
-
Dependencies
- Keep dependencies up to date
- Run
pip install --upgrade -r requirements.txtregularly - Monitor for security advisories
-
Data Privacy
- Be aware that prompts and responses are sent to LLM providers
- Don't include sensitive information in prompts
- Review your LLM provider's privacy policy
-
Network Security
- Use HTTPS for API calls (handled by default)
- Consider using a firewall or VPN for sensitive work
When contributing code:
-
Code Review
- All code must be reviewed before merging
- Security-sensitive changes require extra scrutiny
- Use automated security scanning tools
-
Dependency Management
- Pin dependency versions in
requirements.txt - Review dependency security advisories
- Keep dependencies minimal and well-maintained
- Pin dependency versions in
-
Input Validation
- Validate all user inputs
- Sanitize data before processing
- Use type hints and pydantic for validation
-
Secrets Management
- Never hardcode secrets
- Use environment variables
- Add security checks in CI/CD
- Risk: API keys could be accidentally committed
- Mitigation:
.envis in.gitignore, pre-commit hooks recommended - Detection: GitHub secret scanning enabled
- Risk: Malicious prompts could manipulate agent behavior
- Mitigation: Input validation, agent system prompts include safety guidelines
- Status: Ongoing monitoring
- Risk: Third-party dependencies may have vulnerabilities
- Mitigation: Regular dependency updates, automated scanning
- Tools: Dependabot enabled, regular security audits
- Risk: Data sent to LLM providers could be stored or logged
- Mitigation: User responsibility to review provider policies
- Documentation: Privacy considerations documented in README
Security updates will be:
- Released as soon as possible after discovery
- Documented in release notes
- Announced through GitHub Security Advisories
- Tagged with semantic versioning (patch for security fixes)
We follow coordinated disclosure:
- Vulnerability reported privately
- Fix developed and tested
- Security advisory published
- Fix released
- Public disclosure after fix is available
We use the following tools to maintain security:
- GitHub Dependabot: Automatic dependency updates
- GitHub Code Scanning: Static analysis
- Bandit: Python security linting
- flake8: Code quality and security checks
- pytest: Security-focused test cases
KhazarLLMs aims to follow:
- OWASP Top 10: Web application security risks
- CWE Top 25: Most dangerous software weaknesses
- NIST Guidelines: Secure software development
For security concerns:
- Security Issues: Use GitHub Security Advisories or email
- General Questions: Open a regular GitHub issue
- Urgent Matters: Email with [URGENT] in subject
We appreciate security researchers who responsibly disclose vulnerabilities. Recognized contributors will be:
- Credited in release notes (with permission)
- Listed in SECURITY.md acknowledgments
- Thanked in the project community
Thank you for helping keep KhazarLLMs and its users secure! 🔒